Cyber Safety
Cyber Safety Tips and Tricks
01
02
03
04
05
Download trusted source apps and use trusted URLs only. Exercise caution when downloading anything.
Enable Multi Factor Authentication and use unique, strong passwords.
Delete requests for financial information and offers of assistance. Adjust your spam filters to high setting to filter out potentially deceptive communications.
Take a deliberate approach. Research the facts, allocate ample time, and maintain a healthy skepticism.
Exercise caution regarding your personal information online, as the more information available, the greater the risk of becoming a victim.
06
07
08
09
10
Report suspicious activity.
Steer clear of signing up for dubious accounts and newsletters from untrusted sources.
Exercise caution when encountering tempting, overly attractive, and foreign offers.
Use separate emails for personal and business communications.
Protect your computing devices by keeping your software updated, using firewalls and VPNs, and utilizing anti-virus software. Additionally, remember to regularly backup your data and securely dispose of sensitive information.
Tips for Identifying Attacks
01
Verify the sender's identity before engaging with any messages. Be sure to check the sender's address, such as the email address or phone number, regardless of how legitimate the communication may seem.
02
Be vigilant about webpage URLs. Scrutinize them closely for any discrepancies, and if anything seems amiss, exercise caution and do not trust the source.
03
Exercise caution when dealing with links and pop-out windows.
04
Be aware that offers that seem too good to be true are often just that, and it's best to avoid them.
05
Exercise caution when assessing the language and design of communications. Pay special attention to messages implying outstanding debts or funds to be collected.
06
Steer clear of clicking on attachments and links, especially if you have doubts about the sender. Links may contain malware and viruses.
07
Refrain from answering calls from unfamiliar numbers. If it is essential, the caller can leave a voicemail for you to verify their identity. However, do not engage with calls that demand personal information, even if they assert legitimacy. Instead, independently verify their contact information online and ensure you dial the correct number.
08
Enable multi-factor authentication (MFA). MFA involves using a a secondary method to verify your identity. Employing a combination of methods, such as a strong password and a code sent to your email or phone, enhances security by confirming that you are the authorized user accessing an account.